Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
13 views

4 Protocols

Uploaded by

devinabedi16
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

4 Protocols

Uploaded by

devinabedi16
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

Starter: What are the benefits and risks of star and network topology?

Advantages of star topology Disadvantages of star topology

Advantages of bus topology Disadvantages of bus topology


Starter: What are the benefits and risks of star and network topology?
Advantages of star topology Disadvantages of star topology

Efficiency: Fewer collisions between data packets Reliability: if the hub breaks, then the who
network is disrupted
Reliability: if any connections fail only the
node/computer is affected. Cost: Expensive as extra cables and hardware
needed
Security: more secure as data only sent to
intended recipient

Advantages of bus topology Disadvantages of bus topology

Efficiency: Can be slow as there are collisions Reliability: If the main cable breaks then the
whole network breaks
Cost: Cheap to install
Security: Less secure as data are sent to all nodes
Ease of use/installation: Easy to add more
computers
Starter: What is a network
protocol? Find out on the
web
Network protocols
Learning objectives
Explain what a network protocol is
Explain the purpose of the following protocols:
 HTTP
 HTTPS
 SMTP
 POP3
 IMAP
 FTP
 TCP
 UDP
 IP
 Ethernet
 Wi Fi
Standards and network protocols
Standards allow us to achieve compatibility between different
systems
This enables different hardware and code to work together and to
communicate with one another.
Communication protocols establish the standards
A network protocol is a set of rules that allow computers to
communicate and exchange information over a network.
There are many types of protocols depending on the application.
HTTP – Hypertext transfer protocol
HTTP is the protocol used for the world wide web. An exchange begins
with a request for a web page from a client web browser to a web
server. The server then sends the web page to the client.

Example request sent by client


GET /index.html HTTP/1.1

Example status response sent by server


HTTP/1.1 200 OK

7
HTTPS – Secure Hypertext transfer protocol

HTTPS is a secure way of transferring data between a web browser


and a server. During transfer the data are encrypted. Thus even if
the data are intercepted it is very difficult to find out what data are in
the messages.
HTTPS is most often used for e-commerce and online banking, where
sensitive data such as credit card numbers and passwords are
encrypted.

8
FTP – File Transfer Protocol

FTP is used to transfer


files between two
computers.
An FTP server allows
large files to be
downloaded from the
server to the client or
uploaded to the server
from the client

9
FTP Task
 Open up an FTP session download
one of the files from the site. Common commands:
 Open up cmd open – start a session
pwd – present working directory
C:> ftp dir - list contents of directory
ftp> open speedtest.tele2.net
get – download a file
User: anonymous
mget – downloadone or more files
Password: anonymous
mput – upload one or more files
ftp> dir
put – upload a file
ftp> get 100KB.zip
cd – change directory
close – close a session
Email

Network

Email is sent by the sender client to the email server. It is stored there
until the recipient requests access and then the email is forwarded to
the receiver’s computer.
Email protocols (SMTP, POP3, IMAP)
SMTP (simple mail transfer protocol): Sends the mail from the user
onto the mail server.

POP3 (Post office protocol): Downloads the mail from the mail server
to the client (user) when requested.

IMAP (Internet Message Access Protocol): Retrieves the mail from the
mail server to the client (user) and allows the user can configure the
storage of email on the server, which facilitates access on any device.
IMAP has superseded POP3.
TCP – Transport control protocol

TCP establishes a connection between two devices


When files are sent over the internet they are broken up into small chunks called
packets.
When they arrive at the destination computer they are reassembled back into the
original format.
TCP handles and controls all this.
TCP is a reliable protocol
TCP waits for acknowledgements to verify whether the packets have reached their
destination.
TCP will also retransmit packets of they have not arrived at the destination or become
corrupted.
13
UDP (User Datagram Protocol)

UDP is used as an alternative to TCP as a connectionless protocol


A connectionless protocol sends out data regardless of whether there
are clients receiving the data, much like a broadcast.
Allows huge volumes of data to be transmitted in real time, by doing
away with error checking.
UDP does not check for lost packets so they do not get re-sent. Packets
continue to be sent without checking whether or not previous packets
have arrived.
 It is used in video conferencing, live streaming and online gaming
when speed is necessary and it does not matter is some packets get lost
IP – Internet Protocol
The internet protocol is a set of rules that govern the transmission of
data across the internet.
The TCP and IP protocol work closely together and are referred to as
TCP/IP.

15
Ethernet

Ethernet is not a single protocol but a collection of related protocols.


Ethernet is commonly associated with wired Local Area Networks.
For transmitting data across an Ethernet LAN the following is a
simplified procedure:
Check whether there is any traffic on the Ethernet.
If so wait for traffic to clear.
Send the packet
Is collision detected, go to step 1 to resend.
Wi-Fi (Wireless Fidelity)
Like Ethernet, Wi-Fi is not a single protocol but a collection of related
protocols.
Wi-Fi uses radio waves to transmit data between devices.
Data are transmitted when the medium is clear
An acknowledgement is received if the transmission was successful.
If no such acknowledgement was received, then the data are resent as it is
assumed that a collision occurred, and the packets did not reach their
destination.
Plenary (4-plenary-network-protocols.docx)
a) What is a network protocol?
b) What protocol is used for requesting the website www.google.com?
c) What protocol is used for transferring the email from the sender’s
computer to the mail server?
d) What protocol is used for transferring email from the mail server to
the receiver’s computer?
e) What is the difference between TCP and UDP?
f) Why would you use HTTPS and not HTTP for accessing your online
bank account?

You might also like